{"id":1336,"date":"2023-02-03T21:23:33","date_gmt":"2023-02-03T21:23:33","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1336"},"modified":"2023-02-03T21:23:33","modified_gmt":"2023-02-03T21:23:33","slug":"relatare-istorica-despre-cybersecuritate","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ro\/securitate-cibernetica\/relatare-istorica-despre-cybersecuritate\/","title":{"rendered":"Prezentare istoric\u0103 a securit\u0103\u021bii cibernetice"},"content":{"rendered":"<p>Tr\u0103im \u00een era informa\u021biei, ceea ce implic\u0103 numeroase schimb\u0103ri \u00een via\u021ba uman\u0103, \u00een diversele sale sectoare sociale, guverne \u0219i state. Tot ceea ce am construit a fost influen\u021bat de era digital\u0103, motiv pentru care asociem Tehnologiile Informa\u021biei \u0219i Comunica\u021biilor cu o multitudine de activit\u0103\u021bi care contribuie la percep\u021bia, structurarea \u0219i \u00een\u021belegerea vie\u021bii. <\/p>\n\n\n\n<p>Ca rezultat al naturii noastre evolutive, dreptul de a ne sim\u021bi \u00een siguran\u021b\u0103 \u00een era informa\u021biei ne determin\u0103 s\u0103 dezvolt\u0103m securitatea cibernetic\u0103 \u0219i ap\u0103rarea cibernetic\u0103 pentru a garanta dreptul la intimitate, anonimat \u0219i protec\u021bia bunurilor tangibile \u0219i intangibile. De aceea, fiin\u021ba uman\u0103 este interesat\u0103 s\u0103 \u00eenve\u021be mai multe despre studiile de securitate cibernetic\u0103, analiza juridic\u0103 a dreptului informatic \u0219i abord\u0103rile criminologice \u00een spa\u021biile virtuale, deoarece exist\u0103 o nevoie de a promova securitatea informa\u021biei, at\u00e2t \u00een stat, c\u00e2t \u0219i \u00een sectoarele sociale, astfel \u00eenc\u00e2t s\u0103 se \u00een\u021beleag\u0103 c\u0103 este un drept de a contribui la aproprierea cuno\u0219tin\u021belor \u0219i a instrumentelor necesare pentru a asigura securitatea informa\u021biei \u00een spa\u021biile personale \u0219i guvernamentale de ac\u021biune, precum \u0219i \u00een sectoarele private \u0219i publice. informa\u021bii \u0219i m\u0103suri preventive.<br><\/p>\n\n\n<h2 class=\"simpletoc-title\">Tabla de con\u021binut<\/h2>\n<ul class=\"simpletoc-list\">\n<li><a href=\"#what-is-the-origin-of-the-term-cybernetics\">Care este originea termenului \u201ccibernetic\u0103\u201d?<\/a>\n\n<\/li>\n<li><a href=\"#when-did-you-first-mention-cyberspace\">C\u00e2nd a\u021bi men\u021bionat pentru prima dat\u0103 spa\u021biul cibernetic?<\/a>\n\n<\/li>\n<li><a href=\"#the-beginnings-of-security-in-information-environments\">\u00cenceputurile securit\u0103\u021bii \u00een mediile informa\u021bionale<\/a>\n<\/li><\/ul>\n\n<h2 class=\"wp-block-heading\" id=\"what-is-the-origin-of-the-term-cybernetics\">Care este originea termenului \u201ccibernetic\u0103\u201d?<\/h2>\n\n\n<p>Termenul \u201ccibernetic\u0103\u201d este la fel de vechi ca \u201cpolisul\u201d sau \u201cPartenonul\u201d grecesc, indic\u00e2nd c\u0103 \u201cCibernetica provine din grecescul v \u0219i \u00eenseamn\u0103 \u201carta de a pilota o nav\u0103\u201d, de\u0219i Platon l-a folosit \u00een Republica cu sensul de \u201carta de a conduce oamenii\u201d sau \u201carta de a guverna\u201d. Termenul a trecut neobservat timp de secole p\u00e2n\u0103 \u00een primele decenii ale secolului al XX-lea, c\u00e2nd scriitori precum Norbert Wiener au fost pionieri ai studiilor care explic\u0103 rela\u021biile \u0219i diferen\u021bele dintre fiin\u021bele vii \u0219i structurile create de om. <\/p>\n\n\n\n<p>Wiener a sugerat c\u0103 scopul \u201cciberneticii\u201d era dezvoltarea unui \u201c[\u2026] limbaj \u0219i a unor tehnici care s\u0103 ne permit\u0103 s\u0103 abord\u0103m efectiv problema controlului \u0219i comunic\u0103rii \u00een general, dar \u0219i s\u0103 g\u0103sim un bun repertoriu de idei \u0219i tehnici pentru a clasifica manifest\u0103rile sale particulare \u00een anumite concepte\u201d. Trebuie men\u021bionat c\u0103 Wiener a avut primele sale incursiuni teoretice din partea lui Arturo Rosenblueth Stearns, fiind unul dintre cei care au structurat bazele cibernetice eviden\u021biind \u201cproblema interac\u021biunii om-ma\u0219in\u0103\u201d. <\/p>\n\n\n\n<p>Astfel, au fost puse bazele a ceea ce avea s\u0103 devin\u0103 \u201ccibernetica\u201d, care a investigat controlul \u0219i comunicarea \u00een interrela\u021biile umane, animale \u0219i ma\u0219ini.<\/p>\n\n\n\n<p>Ross Ashby a fost unul dintre arhitec\u021bii reflec\u021biilor actuale \u00een primele etape ale g\u00e2ndirii \u201ccibernetice\u201d, care au inclus explica\u021bii biologice \u0219i fizice. Ashby a vizualizat \u00een lucrarea sa \u201cAn Introduction to Cybernetics\u201d, vastitatea \u0219i conexiunea subiectului, \u0219i a subliniat c\u0103 aceast\u0103 ramur\u0103 a g\u00e2ndirii ar tinde s\u0103 dezv\u0103luie \u201c[\u2026] un num\u0103r mare de paralele interesante \u0219i sugestive \u00eentre ma\u0219in\u0103, creier \u0219i societate. \u0218i poate oferi un limbaj comun prin care descoperirile dintr-un domeniu pot fi aplicate cu u\u0219urin\u021b\u0103 altora.\u201d<\/p>\n\n\n\n<p><br>Ace\u0219ti trei factori de cercetare (ma\u0219in\u0103\/creier\/societate) interac\u021bioneaz\u0103 \u00eentr-un mod care ac\u021bioneaz\u0103 ca un ax transversal, rezult\u00e2nd un nou set de procese, rela\u021bii \u0219i limbaje sociale. Domeniul de aplicare s-a extins \u00een timp, transform\u00e2nd \u201ccibernetica\u201d \u00eentr-un domeniu multidisciplinar. Potrivit lui Heylighen \u0219i Joslyn (2001), \u201cfilozofia cibernetic\u0103 larg\u0103 conform c\u0103reia sistemele sunt definite de rela\u021biile lor abstracte, func\u021biile \u0219i fluxurile de informa\u021bii, mai degrab\u0103 dec\u00e2t de materialul sau componentele lor concrete, \u00eencepe s\u0103 p\u0103trund\u0103 \u00een cultura popular\u0103, de\u0219i \u00eentr-un mod \u00eenc\u0103 superficial [\u2026]\u201d.<\/p>\n\n\n\n<p><br>\u00centr-un fel, expresia de impregnare cultural\u0103 a autorilor anteriori a fost impregnat\u0103 cu o extensie \u2019neinteligibil\u0103\u00ab, legat\u0103 de idiomul tipic anilor 1980, \u00een care utilizarea extensiv\u0103 a prefixului \u00bbciber\u201c tindea s\u0103 identifice activit\u0103\u021bi sau abord\u0103ri foarte diverse. Cu toate acestea, este important de men\u021bionat c\u0103 este legat\u0103 de conectivitatea \u0219i radialitatea informa\u021biei care este tipic\u0103 mediilor computa\u021bionale care sunt asumate a fi celule ale unui sistem virtual. \u201d[\u2026] cibernetica apare atunci c\u00e2nd efectoarele (de exemplu, un motor, o ma\u0219in\u0103, mu\u0219chii no\u0219tri etc.) sunt conectate la un organ senzorial, care la r\u00e2ndul s\u0103u lucreaz\u0103 cu semnalele sale asupra efectoarelor\u201c, spune Von Foerster (2003). Aceast\u0103 organizare circular\u0103 este ceea ce d\u0103 na\u0219tere sistemelor cibernetice [\u2026]\u201d.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"when-did-you-first-mention-cyberspace\">C\u00e2nd a\u021bi men\u021bionat pentru prima dat\u0103 spa\u021biul cibernetic?<\/h2>\n\n\n<p>Aceste complexit\u0103\u021bi pe care le-am vizualizat anterior \u00een cuvintele care preced prefixul \u201cciber\u201d, se manifest\u0103 \u00een utilizarea termenului \u201cspa\u021biu cibernetic\u201d, care nu este ini\u021bial legat de teoriile controlului sau sistemele care au modelat disciplina \u201cciberneticii\u201d. Mai mul\u021bi autori dateaz\u0103 termenul \u00een 1984, cit\u00e2nd lucrarea fictiv\u0103 a lui William Gibson, \u00een care \u201cspa\u021biul cibernetic\u201d este descris ca \u201co halucina\u021bie consensual\u0103 experimentat\u0103 zilnic de miliarde de operatori legitimi, \u00een toate na\u021biunile, de copii care sunt \u00eenv\u0103\u021ba\u021bi concepte matematice \u00eenalte... O reprezentare grafic\u0103 a informa\u021biilor extrase din toate computerele din b\u0103ncile sistemului uman. Complica\u021bie de ne\u00een\u021beles.\u201d \u00cen ciuda nout\u0103\u021bii acestei propuneri, ceea ce a expus Gibson ofer\u0103 un aperitiv a ceea ce ar fi cu siguran\u021b\u0103 scenariul digital interconectat c\u00e2teva decenii mai t\u00e2rziu, ceea ce este \u00een concordan\u021b\u0103 cu ceea ce a sugerat \u00een lucrarea sa \u201cNeuromancer\u201d.<\/p>\n\n\n\n<p><br>Intr\u00e2nd \u00eentr-un c\u00e2mp mai teoretic, Cicognani \u00eencearc\u0103 s\u0103 p\u0103trund\u0103 \u00een ad\u00e2ncimile terminologice pentru a propune c\u0103: \u201c[\u2026] \u00een termenul ciber+spa\u021biu, spa\u021biul \u00ee\u0219i asum\u0103 sensul de materie fizic\u0103, \u00een timp ce ciber \u00eei confer\u0103 caracteristici imateriale\u201d. Nu a fost u\u0219or s\u0103 se reconcilieze lumile fizice \u0219i virtuale \u0219i a fost necesar un exerci\u021biu analitic am\u0103nun\u021bit pentru a l\u0103rgi \u0219i pr\u0103bu\u0219i vechile paradigme care f\u0103ceau imperativul material s\u0103 fie acceptat ca real.<\/p>\n\n\n\n<p><br>Aceast\u0103 dezbatere aprins\u0103 asupra \u201cspa\u021biului cibernetic\u201d a dus la observa\u021bii precum cele ale lui Post (2013), care afirm\u0103 c\u0103 \u201c[\u2026] \u00eentrebarea \u2018este spa\u021biul cibernetic cu adev\u0103rat un loc\u2019?\u201d este similar\u0103 cu a \u00eentreba dac\u0103 via\u021ba pe uscat este \u201cidentic\u0103 cu\u201d sau \u201cdiferit\u0103 de\u201d via\u021ba pe mare. R\u0103spunsul este c\u0103 este ambele \u00een acela\u0219i timp. Chiar \u0219i asum\u00e2nd o pozi\u021bie de recunoa\u0219tere a spa\u021biului cibernetic, diferitele curente de g\u00e2ndire revin la o alt\u0103 bifurca\u021bie analitic\u0103, care const\u0103 \u00een abstractizarea \u201cspa\u021biului cibernetic\u201d de la social \u0219i concentrarea pe explica\u021bii \u201cinstrumentaliste\u201d, care, de\u0219i importante, ajung s\u0103 fie insuficiente, g\u0103sind explica\u021bii sistematice precum cele ale lui Folsom (2007), care le detaliaz\u0103: \u201c[\u2026] ca o re\u021bea comutat\u0103 \u00eencorporat\u0103 pentru a muta traficul de date, caracterizat\u0103 \u00een continuare prin grade variate de conectivitate.\u201d<\/p>\n\n\n\n<p><br>Defini\u021biile care tind s\u0103 abordeze acest spa\u021biu virtual, restr\u00e2ng\u00e2ndu-l cu cel uman, se remarc\u0103, deoarece conceptualiz\u0103rile, utiliz\u0103rile \u0219i contribu\u021biile nu pot fi separate de esen\u021ba sa social\u0103, iar \u201cspa\u021biul cibernetic\u201d este \u00een cele din urm\u0103 o crea\u021bie antropic\u0103. \u201cPutem caracteriza spa\u021biul cibernetic ca referin\u021ba spa\u021bial\u0103 utilizat\u0103 \u00een mediile electronice, dar asta ridic\u0103 nevoia noastr\u0103 de a defini spa\u021biul \u00een sine, astfel \u00eenc\u00e2t s\u0103 putem experimenta cum spa\u021biul este de fapt produsul proceselor mentale\u201d, scrie Anders (2001).<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"the-beginnings-of-security-in-information-environments\">\u00cenceputurile securit\u0103\u021bii \u00een mediile informa\u021bionale<\/h2>\n\n\n<p>Dimensiunea absolut\u0103 pe care Tehnologiile Informa\u021biei \u0219i Comunica\u021biilor o desf\u0103\u0219urau asupra diverselor sectoare care compun societatea a devenit cople\u0219itoare, iar securitatea a \u00eenceput s\u0103 fie afectat\u0103 de acest fenomen ca urmare a num\u0103rului de noi dinamici care au ap\u0103rut ca urmare a acestuia. Potrivit lui Caro, \u201ca\u0219a cum a evoluat a\u0219a-numita re\u021bea mondial\u0103 sau World Wide Web, la fel au evoluat \u0219i amenin\u021b\u0103rile cu care se confrunt\u0103.\u201d Analizele strategice, \u00een acest sens, trebuie s\u0103 se desf\u0103\u0219oare \u00eentotdeauna concomitent cu reconfigur\u0103rile sau apari\u021bia amenin\u021b\u0103rilor pentru a delimita proiec\u021bia lor c\u0103tre securitate \u0219i ap\u0103rare. <\/p>\n\n\n\n<p>C\u00e2nd Fred Cohen a \u00eendr\u0103znit s\u0103 afirme o caracteristic\u0103 necunoscut\u0103 anterior a informaticii, cum ar fi viru\u0219ii, conceptele \u00eenr\u0103d\u0103cinate \u00een 1984 nu au observat ini\u021bial impactul strategic, specific\u00e2nd cercet\u0103torul: \u201cDefinim \u201cvirusul\u201d de computer ca un program care poate \u2018infecta\u2019 alte programe prin modificarea lor pentru a include o copie posibil evoluat\u0103 a sa.\u201d Aceste aprecieri ale lui Cohen la acea vreme p\u0103reau s\u0103 fie limitate la o caracterizare tehnic\u0103 a chestiunilor informatice civile, dar asimilarea teoretic\u0103 a fost cea care a dus la \u00eenceputul discu\u021biilor despre \u201camenin\u021b\u0103rile cibernetice\u201d \u00een diferite \u021b\u0103ri \u0219i aceasta a dat na\u0219tere la \u201cap\u0103rarea cibernetic\u0103\u201d \u0219i ca o consecin\u021b\u0103 la \u201cSecuritatea cibernetic\u0103\u201d.<\/p>\n\n\n\n<p><br>Ar fi necesar s\u0103 se adauge variabilei tehnice expuse, tendin\u021ba global\u0103, unde popula\u021bia \u0219i institu\u021biile sale au \u00eenceput s\u0103 interac\u021bioneze \u00eendeaproape cu sistemele cibernetice, p\u00e2n\u0103 la punctul \u00een care Castells a descris aceast\u0103 rela\u021bie ca: \u201cextinderea \u0219i cre\u0219terea corpului \u0219i min\u021bii subiec\u021bilor umani \u00een re\u021bele de interac\u021biune alimentate de tehnologii de comunica\u021bie microelectronice operate de software\u201d. Acest peisaj a ar\u0103tat o expunere tehnologic\u0103, \u00eempreun\u0103 cu poten\u021bialul unei amenin\u021b\u0103ri care a dus la stabilirea de noi nuan\u021be \u00een Securitatea Informa\u021biei, constituind sub-domenii mai specifice, cum ar fi a\u0219a-numita \u201cSecuritate cibernetic\u0103\u201d sau \u201cCriminalistic\u0103 informatic\u0103\u201d.<\/p>","protected":false},"excerpt":{"rendered":"<p>Tr\u0103im \u00een era informa\u021biei, care implic\u0103 numeroase schimb\u0103ri \u00een via\u021ba uman\u0103, \u00een diversele sale sectoare sociale, guverne \u0219i state. Tot ceea ce am construit a fost influen\u021bat de... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ro\/securitate-cibernetica\/relatare-istorica-despre-cybersecuritate\/\">Continue reading <span class=\"screen-reader-text\">Prezentare istoric\u0103 a securit\u0103\u021bii cibernetice<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":1340,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15],"tags":[],"class_list":["post-1336","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Historical Account of Cybersecurity | Security Briefing<\/title>\n<meta name=\"description\" content=\"Discover the evolution of cybersecurity, from its beginnings to the current state of the industry. Learn about the challenges in the history of cybersecurity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ro\/securitate-cibernetica\/relatare-istorica-despre-cybersecuritate\/\" \/>\n<meta property=\"og:locale\" content=\"ro_RO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Historical Account of Cybersecurity | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Discover the evolution of cybersecurity, from its beginnings to the current state of the industry. Learn about the challenges in the history of cybersecurity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ro\/securitate-cibernetica\/relatare-istorica-despre-cybersecuritate\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-03T21:23:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"662\" \/>\n\t<meta property=\"og:image:height\" content=\"327\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scris de\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Timp estimat pentru citire\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"Historical account of Cybersecurity\",\"datePublished\":\"2023-02-03T21:23:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/\"},\"wordCount\":1347,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg\",\"articleSection\":[\"cybersecurity\"],\"inLanguage\":\"ro-RO\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/\",\"url\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/\",\"name\":\"Historical Account of Cybersecurity | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg\",\"datePublished\":\"2023-02-03T21:23:33+00:00\",\"description\":\"Discover the evolution of cybersecurity, from its beginnings to the current state of the industry. Learn about the challenges in the history of cybersecurity.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg\",\"width\":662,\"height\":327,\"caption\":\"Historical account of Cybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Historical account of Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ro-RO\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/ro\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Relatare istoric\u0103 a securit\u0103\u021bii cibernetice | Informare de securitate","description":"Descoper\u0103 evolu\u021bia securit\u0103\u021bii cibernetice, de la \u00eenceputurile sale p\u00e2n\u0103 la starea actual\u0103 a industriei. Afl\u0103 despre provoc\u0103rile din istoria securit\u0103\u021bii cibernetice.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ro\/securitate-cibernetica\/relatare-istorica-despre-cybersecuritate\/","og_locale":"ro_RO","og_type":"article","og_title":"Historical Account of Cybersecurity | Security Briefing","og_description":"Discover the evolution of cybersecurity, from its beginnings to the current state of the industry. Learn about the challenges in the history of cybersecurity.","og_url":"https:\/\/securitybriefing.net\/ro\/securitate-cibernetica\/relatare-istorica-despre-cybersecuritate\/","og_site_name":"Security Briefing","article_published_time":"2023-02-03T21:23:33+00:00","og_image":[{"width":662,"height":327,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"Scris de":"security","Timp estimat pentru citire":"7 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"Historical account of Cybersecurity","datePublished":"2023-02-03T21:23:33+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/"},"wordCount":1347,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg","articleSection":["cybersecurity"],"inLanguage":"ro-RO"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/","url":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/","name":"Relatare istoric\u0103 a securit\u0103\u021bii cibernetice | Informare de securitate","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg","datePublished":"2023-02-03T21:23:33+00:00","description":"Descoper\u0103 evolu\u021bia securit\u0103\u021bii cibernetice, de la \u00eenceputurile sale p\u00e2n\u0103 la starea actual\u0103 a industriei. Afl\u0103 despre provoc\u0103rile din istoria securit\u0103\u021bii cibernetice.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#breadcrumb"},"inLanguage":"ro-RO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg","width":662,"height":327,"caption":"Historical account of Cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Historical account of Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Informare de Securitate","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ro-RO"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Informare de Securitate","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"securitate","image":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin este redactor senior pentru Government Technology. Anterior a scris pentru PYMNTS \u0219i The Bay State Banner \u0219i de\u021bine o diplom\u0103 de licen\u021b\u0103 \u00een scriere creativ\u0103 de la Carnegie Mellon. Ea locuie\u0219te \u00een afara Bostonului.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/ro\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/1336","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/comments?post=1336"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/1336\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media\/1340"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media?parent=1336"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/categories?post=1336"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/tags?post=1336"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}